From managing and securing personal information, secure analysis of digital footprints, ensuring trust of digital identity through cryptographic assurance, and providing insights on the dangers of digital inequalities that may be introduced through digital identity, CACI are the technical delivery integrators of digital identity solutions for mission critical software projects across the public sector. In areas including Home Office, Cabinet Office, Defence, and National Security and Intelligence, CACI’s Information Intelligence Group (IIG) are able to leverage their broad domain experience to ensure that lessons from digital identity implementation are applied across government. We are product agnostic and have invested in understanding how the best in class open-source software solutions can be integrated into systems in a way that supports future change. Using effective application of software and data engineering, DevSecOps processes and a Cloud native approach, we work to deliver insightful, innovative, and effective digital identity solution integrations for our customers.
Main office address
020 7602 6000
Key Products / Services / Sectors (USPs)
Key Service: Secure Cloud Application and Platform Design and Development Services
Digital application development based on secure-by-design engineering practices, open source, open standards and cloud-native evolutionary architectures. CACI’s end-to-end Cloud Web Application Development service is provided by an in-house team of over 300 experienced polyglot technologists that design and build new, or modernise existing, mission-critical web applications for the Cloud.
Track record in delivering secure, high performance, mission-critical solutions relating to digital identity challenges including (but not limited to); cryptographic assurance of electronic Machine-Readable Travel Documents (eMRTDs), cryptographic key management, identity assurance service integration.
Key Service: Cloud Data Engineering and Integration Services
High quality, innovative, robust and secure data engineering solutions for HMG and commercial suppliers, getting critical data to the right place at the right time.
Data modelling and data-oriented business analysis based on creating a deep domain understanding and your organisation’s current technology estate. Managing data and identity distribution through Microservices and API management, we create value chains that manage the landing, enrichment, fusion, and exploitation of your data; augmenting human knowledge to provide context and insight at scale. Encoding, encryption, compression, and integrity checking and assurance is designed into our solutions from inception and verified through compliance and audit mechanisms, as-well as fine-grained data access control to give total assurance and control.
Key Product: MooD
A tool that allows organisations and enterprises to architect and exploit digital identity solutions while providing the complete requirements traceability and visibility so that the key constraints around security, privacy, assurance, and verifiability are always considered.
Providing capabilities including Digitised Enterprise Management, Information Knowledge Management, Digital Twin, and Business Process Modelling.
Key Product: Insite Everywhere
An online geographical information system (GIS) platform designed specifically to provide users with access to a variety of open data, licensed CACI proprietary datasets. Comprehensive digital insight providing an understanding of online access, behaviour and activity. Ideal when developing online and offline digital identity services.
Area of focus
Internal services (enterprise)
Identity provisioning (IdP)
Offer translation of protocols
Can offer consent capture if required
Can capture self-asserted
Can verify self-asserted
Can integrate with third parties (eg Open Banking)
Supports verified claims (VCs)
Yes – third party verifiers used (including Open Banking)
Yes – In-house verification service
Multiple factors (MFA)
Data store functionality
Configurable for specific sectors (e.g. health)
Use decentralised stores (eg Wallets or online)
Can offer consent capture/handling
Account management for users
Key management required by user
DID (decentralised identifiers)
Third party capability
Data minimisation support
Variable registration (multi-user journey support)
Support for accessibility
Logging and audit
Offline options, incl. F2F
Upgrade paths to increase assurance levels over time
Creation of delegated accounts
To modify system behaviour
For risk-based authentication
To use events to drive transactions
To manage user journeys, including verification
To handle LOA upgrades/downgrades
Handle identity document’s (eg drivers license)
Handle health information (eg vaccine certificates)
Main point of contact
Name: Dave Moss